Red Hat JBoss Platform Denial of Service Vulnerability
Summary
CERT-Bund has issued a security advisory for Red Hat JBoss Enterprise Application Platform, detailing a vulnerability that allows remote attackers to cause a Denial of Service. The advisory provides information on affected versions and mitigation strategies.
What changed
CERT-Bund has released Security Advisory WID-SEC-2026-0761 concerning a Denial of Service vulnerability in Red Hat JBoss Enterprise Application Platform versions prior to 8.1.5. The vulnerability, with a CVSS Base Score of 5.3, can be exploited by remote, anonymous attackers. Affected operating systems include Linux, UNIX, and Windows.
Organizations utilizing the affected Red Hat JBoss Enterprise Application Platform versions should review the advisory for mitigation strategies. While no specific compliance deadline is mentioned, prompt application of available patches or workarounds is recommended to prevent service disruption and potential cascading impacts on business operations. The advisory highlights the need for continuous monitoring and patching of critical infrastructure components.
What to do next
- Review CERT-Bund Security Advisory WID-SEC-2026-0761
- Assess if Red Hat JBoss Enterprise Application Platform < 8.1.5 is in use
- Implement recommended mitigation strategies to address the Denial of Service vulnerability
Source document (simplified)
[WID-SEC-2026-0761] Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service CVSS Base Score 5.3 (mittel) CVSS Temporal Score 4.6 (mittel) Remoteangriff ja Datum 17.03.2026 Stand 18.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
JBoss Enterprise Application Platform ist eine skalierbare Plattform für Java-Anwendungen, inklusive JBoss Application Server, JBoss Hibernate und Boss Seam.
Produkte
17.03.2026
- Red Hat JBoss Enterprise Application Platform <8.1.5
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat JBoss Enterprise Application Platform ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.